Updating the Netprobe

The UpdateNetprobe.yaml CloudFormation template updates the Netprobe on existing EC2 instances using the AWS Systems Manager (SSM). It follows the sequence:

Prerequisites Copied

Input parameters Copied

Target EC2 configuration Copied

Parameter Description Default Required
InstanceIds Comma-separated list of existing EC2 Instance IDs Yes

Netprobe configuration Copied

Parameter Description Default Required
NetprobeInstallDirectory Directory where Netprobe will be installed ~/geneos No
S3NetprobeURL S3 URL to the Netprobe tar.gz file Yes
S3NetprobeSetupURL S3 URL to the Netprobe setup XML file Yes

Verification and debugging Copied

Run the following commands if you need to verify or debug your deployment.

View template execution logs Copied

ssh -i <privatekey> <user>@<host> "sudo cat /var/log/amazon/ssm/amazon-ssm-agent.log"

Check the service status Copied

ssh -i <privatekey> <user>@<host> "systemctl is-active <service>.service"

Download the logs Copied

ssh -i <privatekey> <user>@<host> "sudo tar -cvz -C "cd <install_dir> && find <service> -type f -name '*.log' -print0 | sudo tar --null -czf - --files-from -" > <service>-logs.tar.gz
["Geneos"] ["Geneos > Netprobe"] ["User Guide"]

Was this topic helpful?